메뉴 건너뛰기




Volumn 13, Issue 4, 2011, Pages 658-672

Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges

Author keywords

Ad Hoc Networks; Black Hole Attack; Packet Dropping Attack; Routing Protocols Security

Indexed keywords

BATTERY POWER; BLACK HOLE ATTACK; CRYPTOGRAPHIC PRIMITIVES; HOSTILE ENVIRONMENTS; MALICIOUS NODES; MISBEHAVING NODES; NETWORK CHARACTERISTICS; NETWORK COLLAPSE; PACKET DROPPING; PACKET DROPPING ATTACK; REACTION SCHEMES; ROUTING PATH;

EID: 84857921036     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.072210.00026     Document Type: Article
Times cited : (109)

References (51)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir, How to Share a Secret, Communications of the ACM, 22(11): 612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 2
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • L. Lamport, Password Authentication with Insecure Communication, Communications of the ACM, 24(11): 770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • October
    • H. Deng, W. Li and D. P. Agrawal, Routing security in wireless ad hoc networks, IEEE Commun. Mag., 40(10): 70-75, October 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 17
    • 84944714533 scopus 로고    scopus 로고
    • Collaborative security architecture for black hole attack prevention in mobile ad hoc networks
    • Boston, Massachusetts, USA, August
    • A. Patcha and A. Mishra, Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, In Proc. Radio and Wireless Conference (RAWCON '03), Boston, Massachusetts, USA, August 2003.
    • (2003) Proc. Radio and Wireless Conference (RAWCON '03)
    • Patcha, A.1    Mishra, A.2
  • 21
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May
    • Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, 2(3): 28-39, May 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 23
    • 25844465866 scopus 로고    scopus 로고
    • HADOF: Defense against routing disruptions in mobile ad hoc networks
    • Miami, USA, March
    • W. Yu, Y. Sun and K. R. Liu, HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks, In Proc. 24th IEEE INFOCOM, Miami, USA, March 2005.
    • (2005) Proc. 24th IEEE INFOCOM
    • Yu, W.1    Sun, Y.2    Liu, K.R.3
  • 26
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • Fourth Quarter
    • D. Djenouri, L. Khelladi and N. Badache, A survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Commun. Surveys & Tutorials, 7(4): 2-28, Fourth Quarter 2005.
    • (2005) IEEE Commun. Surveys & Tutorials , vol.7 , Issue.4 , pp. 2-28
    • Djenouri, D.1    Khelladi, L.2    Badache, N.3
  • 28
    • 27844590384 scopus 로고    scopus 로고
    • A survey on wireless mesh networks
    • September
    • I. F. Akyildiz and X. Wang, A Survey on Wireless Mesh Networks, IEEE Commun. Mag., 43(9), S23-S30, September 2005.
    • (2005) IEEE Commun. Mag. , vol.43 , Issue.9
    • Akyildiz, I.F.1    Wang, X.2
  • 29
    • 34547610382 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • Third Quarter
    • P. Argyroudis and D. O'Mahony, Secure Routing for Mobile Ad Hoc Networks, IEEE Commun. Surveys & Tutorials, 7(3): 2-21, Third Quarter 2005.
    • (2005) IEEE Commun. Surveys & Tutorials , vol.7 , Issue.3 , pp. 2-21
    • Argyroudis, P.1    O'Mahony, D.2
  • 32
    • 33845927390 scopus 로고    scopus 로고
    • Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing
    • United States Military Academy, West Point, NY, 21-23 June
    • S. S. Ramaswami and S. Upadhyaya, Smart handling of Colluding black Hole attacks in MANETs and Wireless Sensor Networks using Multipath Routing, In Proc. Workshop on Information Assurance, United States Military Academy, West Point, NY, 21-23 June 2006.
    • (2006) Proc. Workshop on Information Assurance
    • Ramaswami, S.S.1    Upadhyaya, S.2
  • 33
    • 33751209191 scopus 로고    scopus 로고
    • Two-tier authentication for cluster and individual sets in mobile ad hoc networks
    • February
    • Y. R. Tsai and S. J. Wang, Two-tier authentication for cluster and individual sets in mobile ad hoc networks, Computer Networks, 51(3): 883-900, February 2007.
    • (2007) Computer Networks , vol.51 , Issue.3 , pp. 883-900
    • Tsai, Y.R.1    Wang, S.J.2
  • 37
    • 33845666617 scopus 로고    scopus 로고
    • Inner-circle consistency for wireless ad hoc networks
    • January
    • C. Basile, Z. Kalbarczyk and R. K. lyer, Inner-Circle Consistency for Wireless Ad Hoc Networks, IEEE Trans. Mobile Comput., 6(1): 39-55, January 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.1 , pp. 39-55
    • Basile, C.1    Kalbarczyk, Z.2    Lyer, R.K.3
  • 38
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    • May
    • K. liu, J. Deng, P. K. Varshney and K. Balakrishnan, An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs, IEEE Trans. Mobile Comput., 6(5): 536-550, May 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4
  • 39
    • 38549088052 scopus 로고    scopus 로고
    • Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
    • Glasgow, June
    • N. Nasser and Y. Chen, Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks, In Proc. Internationl Conference on Communication (ICC 07), Glasgow, June 2007.
    • (2007) Proc. Internationl Conference on Communication (ICC 07)
    • Nasser, N.1    Chen, Y.2
  • 42
    • 54249101364 scopus 로고    scopus 로고
    • Surveying security analysis techniques in MANET routing protocols
    • Fourth Quarter
    • T. R. Andel and A. Yasinsac, Surveying Security Analysis Techniques in MANET Routing Protocols, IEEE Commun. Surveys & Tutorials, 9(4): 70-84, Fourth Quarter 2007.
    • (2007) IEEE Commun. Surveys & Tutorials , vol.9 , Issue.4 , pp. 70-84
    • Andel, T.R.1    Yasinsac, A.2
  • 44
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • October
    • Y. Zhang, W. Lou, W. Liu and Y. Fang, A secure incentive protocol for mobile ad hoc networks, Wireless Networks journal, 13(5): 569-582, October 2007.
    • (2007) Wireless Networks journal , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Lou, W.2    Liu, W.3    Fang, Y.4
  • 50


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.